Papers
Topics
Authors
Recent
2000 character limit reached

Introducing a Novel Quantum-Resistant Secret Key Establishment Method (2403.00992v2)

Published 1 Mar 2024 in cs.IT and math.IT

Abstract: We present a novel approach to secret key establishment that appears to be resistant to currently known quantum cryptanalytic algorithms. This quantum resistance arises because the security of our method does not rely on the difficulty of integer factorization or the discrete logarithm problem. Based on the analyses of Alice's public key, the communication exchange between Alice and Bob, and the scenario where Bob behaves as Eve, we can conclude that, even if Eve has access to a quantum computer capable of solving discrete logarithms, she is unable to determine Alice's private key. Additionally, our approach achieves Perfect Forward Secrecy (PFS), ensuring that the security of previously used keys is not compromised by any key that becomes compromised. Notably, our system offers competitive public and private key sizes compared to those currently available.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (12)
  1. Peter W. Shor. Algorithms for quantum computation: Discrete logarithms and factoring In Foundations of Computer Science, 1994 Proceedings, 35th Annual Symposium on, pages 124–134. IEEE, 1994
  2. Marco A. Barreno. The future of cryptography under quantum computers In Dartmouth College Computer Science Technical Reports. 2002
  3. Daniel J. Bernstein. Introduction to post-quantum cryptography In Post-quantum cryptography, pages 1–14. Springer, 2009
  4. Eberhard Stickel. A new method for exchanging secret keys In Third International Conference on Information Technology and Applications (ICITA’05), pages 426–430. IEEE, 2005
  5. Group-based cryptography Springer Science & Business Media, 2008
  6. Vladimir Shpilrain. Cryptanalysis of Stickel’s key exchange scheme In International Computer Science Symposium in Russia, pages 283–288. Springer, 2008
  7. Dima Grigoriev, Vladimirv Shpilrain. Tropical cryptography In Communications in Algebra, vol. 42, 6, pages 2624–2632. Taylor & Francis, 2014
  8. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem In IACR Cryptol. ePrint Arch., vol. 2012, pages 688. Citeseer, 2012
  9. An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms In Electronics, vol. 11, 6, pages 891. MDPI, 2022
  10. Quantum cryptography: public key distribution and coin tossing In Conf. on Computers, Systems and Signal Processing (Bangalore, India, Dec. 1984), pages 175–179. 1984
  11. Whitfield Diffie, Martin Hellman. New directions in cryptography In IEEE transactions on Information Theory, vol. 22, 6, pages 644–654. IEEE, 1976
  12. Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms In IEEE transactions on Information Theory, vol. 31, 4, pages 469–472. IEEE, 1985
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Whiteboard

Paper to Video (Beta)

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.